AT&T Consultant/Vendor Sales Group

UPDATE April 2007

k a r i ’ s c o r n e r New Opportunities

i n s i d e . . . What a busy start to the year! Our merger integration with BellSouth continues to expand our business and consumer solutions portfolio. Local to 3 global, we remain dedicated to providing the most complete, secure and reliable networks for your Zombie Networks business success. –Jerry Hinek In such a fast-changing industry, access to the latest information is essential. Your Consultant Liaison Managers certainly take the lead in keeping you informed, and we hope you also 6 find value in this publication. And this year we are delighted to add to that communications stream by offering you the opportunity to attend AT&T BusinessDirect® FOCUS seminars! FOCUS is a non-profit AT&T business user group that –Robert Sloan has grown steadily by providing an active forum for communications users and providers. FOCUS programs and events provide the professional advantage members need to stay on top of today’s industry 8 evolution. Earlier this year, we had a very successful FOCUS chapter meeting in Data with David Anaheim, California. Consultant Robert Harris from Communications –Tom David Advantage said the event was “a great example of how the CLP program keeps me (and my team members) informed and supported, 12 and ethically leverages the relationship that consultants have with clients.” One Laptop per Also in Anaheim, consultants were invited to attend our Networking Child Leaders Forum. This full-day event gave consultants, customers and AT&T account teams the opportunity to discuss the critical business –Nancy Grover continuity and network security issues businesses face today. Participants were able to observe as the AT&T Network Disaster Recovery (NDR) team conducted a test of our business continuity processes in the event of a network outage. Consultant Roy Walker, president of Walker Consulting LLC, remarked, “I was very impressed with the event and appreciate knowing about these vital services.” Continued on page 5 in this issue... 1 Kari’s Corner by Kari Aguinaldo AT&T Customer Service 3 Numbers Zombie Networks by Jerry Hinek 6 Pre-Merger SBC Areas: AT&T BusinessDirect® by Robert Sloan California Sales & Billing Repair 8 Small Business 1-800-750-2355 611 or Toll-free Data with David by Tom 1-800-750-2355 David Medium Business 1-800-891-1800 611 or Toll-free 11 1-800-332-1321 CPUC Considers Area Code Changes Nevada Sales & Billing Repair 12 Business/Consumer 1-800-288-2020 1-877-469-2355 – Bridging the Digital Divide Southwest Business by Nancy Grover Sales 1-800-499-7928 14 Billing 1-800-559-7928 AT&T Yellow Pages Mirrors Societal Changes Repair 1-800-286-8313 15 Midwest Small Business Small Business AT&T Tops All Competitors in Sales & Billing Repair Leading Analyst’s U.S. Carrier Assessment Indiana 1-800-660-3000 1-800-727-2273 Wisconsin 1-800-660-3000 1-800-727-2273 Illinois 1-800-660-3000 1-800-727-2273 Ohio 1-800-660-3000 1-800-727-2273 UPDATE Editor Michigan 1-800-660-3000 1-800-727-2273 Elaine Tipping Español 1-800-426-2902 [email protected] East (CT) Sales & Billing Repair Contributors Business 1-800-448-1008 1-800-922-4646 Kari Aguinaldo Tom David Pre-Merger AT&T Mass Market Areas: Nancy Grover Jerry Hinek Local and Long Distance Service: 1-800-222-0300 Robert Sloan AT&T CallVantage Service: 1-866-596-8464 AT&T Worldnet and DSL Service: 1-800-WORLDNET (1-800-967-5363) Layout & Design Lillian Cram AT&T MultiMedia Productions AT&T Alascom (Alaska): Business Services: 1-800-955-9556 Publisher AT&T West Business Communications Services Sales Operations

2 j e r r y h i n e k

Zombie Networks

One of the viruses are purposefully designed, primary tools in the written and modified. Those writing the cyber wars waged viruses have goals in mind, and their against each of us skill in writing the virus determines how A zombie is every day is the successful they will be in achieving their a personal zombie. A zombie is goals. For both kinds of virus there are a personal precautions you can take before computer computer whose infection, and things you can do after whose processing time and infection, to lessen the pain or hasten capabilities are taken over anonymously the recovery. The last half of this article processing and remotely by a hostile stranger, for discusses protecting yourself. time and personal enrichment, at the expense of the computer owner. Self-Replication capabilities It’s just a technical problem to write a A zombie network can consist of computer virus to infect a computer. In are taken thousands of zombies controlled by one some ways it’s no different than writing over person. A zombie can be used to attack any other software except that the other computers, to send spam or to person who owns the target computer anonymously disrupt other normal activities. If you may have to be tricked into allowing the and remotely haven’t taken care to protect yourself, virus into the computer. your own computer could be a zombie. by a hostile Early viruses spread when people Zombies are an evolutionary by- shared infected 3.5 inch diskettes. This stranger, for product in the development of computer process took time, and viruses spread personal viruses. The first viruses were written slowly. The cycle would start with a virus simply to be disruptive. New technology, writer infecting a diskette that had some enrichment, new computers and new virus attractive file or game or other software at the techniques, along with the profit that an unknowing person might want to potential, lead to the creation of viruses run. Then the virus writer would give the expense of that create zombies. diskette to someone who would load the the Computer viruses have always had infected diskette into a PC and infect it. three main components: infection, self- Then the infected PC would infect other computer replication and payload. diskettes that were passed around and owner. loaded into other PCs. Infection Just as an organic virus infects human The Internet has enabled viruses to beings, a computer virus infects its spread almost instantly around the victims in the course of normal globe. They can hit and infect a activities. Shaking hands or flying on an vulnerable computer, replicate airplane with a sick person can lead to a themselves and attack other computers cold or flu. Having your computer many times a second. Even with good connected to the Internet, opening email anti-virus software, a new virus may or surfing infected websites can lead to infect a computer before updates are a computer virus. available to clean the virus or to protect uninfected computers. The virus infection takes place without any direct awareness by the infected Payload person or system. We wouldn’t choose So why do virus writers write viruses? to become infected or to have our Motivation is personal, and virus writers computers infected. have different motives. Early viruses Of course, where this analogy breaks were written for three primary purposes: down is that while viruses in humans are for the challenge, to disrupt or annoy a a product of natural selection, computer Continued on page 4

3 Continued from page 3 When a computer is infected it may person, and to destroy the information contact a computer owned by the on a computer. That was the limit of the malicious attacker anywhere in the technology at the time. world and ask for further instructions. The attacker then loads more malicious As virus writers developed techniques software. With enough computers under to exploit technological advances and to control, the zombies become a powerful stay ahead of the anti-virus industry, tool for attack. they got better at spreading their viruses. They discovered ways to profit, Protecting Yourself and they got greedy. Some may still Protecting your computer and write viruses for the challenge, but most network from hostile attacks is one of Some may viruses are written not to destroy or to the areas in life where enlightened self- annoy, but to steal computer capabilities interest aligns with the common good. If still write remotely, and to cash in. you protect your computer you can’t viruses for Zombie networks can be made to easily be attacked, and you won’t likely send out newer viruses or spam and have your computer attacking others. If the phishing that generate great profits if we all take responsibility for our own challenge, even a small number of recipients security we will get the most benefit respond. These networks can also be from our investments in our computers. but most bought and sold or rented to others. Software Updates viruses are How a Computer Becomes a Both operating systems and written not Zombie application software normally contain To stay ahead of the anti-virus weaknesses in their designs that hackers to destroy or industry, virus writers incorporate hacker exploit. Oversight or lack of training on to annoy, but techniques and tools. In fact, a lot of the part of the software developers viruses are merely automated hacking contributes to the problem, as does the to steal plus the ability to replicate. fact that operating systems and applications are written by teams of computer Hackers look for vulnerabilities in people, are very complex, and can operating systems and common capabilities contain millions of lines of code. There software, and then they look for ways to are many ways to attack software, and remotely, and exploit any weaknesses. They do that by the larger the program, the more points pushing legitimate software to its design to cash in. of attack there are. limitations to find anything that the writer didn’t think to handle. It can be as As vulnerabilities in software become simple as putting a 25-character name known, the companies that develop and into a field that was only designed for sell software release updates that 24, or as complicated as sending a attempt to patch weaknesses. This is a network signal that appears to conform double-edged sword because release of to protocol but is constructed to bypass a patch lets hackers know there is an security. Tactics from the simple to the opportunity for attack. It’s always in your complex may break the software or own interest to keep your PC up to date operating system and give the hacker with any security-related patches. You the privileges of the owner or may not care about a patch that fixes administrator. processing of daylight savings time in Australia, but you should care about a Hackers have their own networks for patch that closes a security hole. information sharing. They brag about the vulnerabilities they’ve found and share The majority of people use Windows® their techniques and tools for exploit software. Windows can be set to update and attack. itself automatically. Make sure that function is enabled for your PC. Virus writers take some of these tools and techniques and incorporate them Firewalls into viruses. An attack may hit a Good firewalls do two things: they thousand computers, and infect ten. make it difficult for hostile attackers to That creates ten zombies that can be reach your system, and they can prevent made to attack another thousand an infected computer from sending computers each. messages to unknown computers 4 anywhere in the world. Your computer computer. Learn how to create a restore should only communicate with the point on your computer and how to Internet at your will. recover your computer to a restore Firewalls are readily available. You can point. purchase them at most retail electronics Back Up Your Computer stores. Software firewalls and network Backing up a computer is one of routers with Stateful Packet Inspection people’s favorite things not to do, even (SPI) firewalls are inexpensive to buy and though there are so many reasons to do to install. it. There’s a delusion that if things are Anti-virus Software going well today they will go well Most people have easy access to free tomorrow. Not only can a back-up save or inexpensive anti-virus software from your day if you lose your computer or Good your hard drive crashes, it can mean their Internet Service Providers. Anti- firewalls do virus software is available in retail success or failure with important stores, office supply stores, warehouse professional or personal projects stored two things: on the PC. clubs and computer stores. Anti-virus they make it software can also protect you from The zombies really are out to get you. phishing and spyware. It’s worth your They’re real and they don’t sleep. By difficult for time to get it and run it. protecting your own computers you can hostile save yourself and others from the Restore Points disruption and damage of zombie attackers to Newer operating systems allow you to attacks. restore your computer configuration to reach your the way it looked on a previous date. In system, and case of infection or failure, it can be helpful to know how to go back to the Jerry Hinek, CISSP they can time before the problems arose. That Senior Business Security Manager prevent an won’t always work, but if it does it can AT&T Information Services save a lot of headaches in cleaning your infected computer from sending KARI’S CORNER – Continued from page 1 core network. A special tour has been out FOCUS opportunities are available in arranged for consultants immediately Northern California as well. Don’t miss following the Sacramento FOCUS messages to the upcoming chapter meetings in San meeting. If you are interested, please unknown Francisco April 24th and in Sacramento contact your Liaison Manager at 1-800- April 25th. The agenda includes: 552-5299 to reserve your place. computers • IP technology update and training by We hope these new training anywhere in industry experts Hill & Associates opportunities help ensure continued the world. • Forward-looking view of the success for your company, because – as IT/telecom industry by Nemertes always – your success is our success! Research • Interactive demonstrations by Avaya, Kari Aguinaldo Nortel, Cisco and others CVSG Leader • Networking opportunities with your 415-644-7118 peers [email protected] For those of you able to attend FOCUS in Sacramento, we have a special opportunity. Sacramento is home to one of two AT&T Network Operating Centers in California (the other is in San Diego). The NOC is responsible for surveillance, provisioning, and integrity of the AT&T

5 r o b e r t s l o a n AT&T BusinessDirect®

Monitoring and Managing Your Network Is as Easy as Point and Click

This industry AT&T BusinessDirect Map delivers teaches us that point-and-click network management customers think capabilities atop an interactive world about telecom map, in real-time . It empowers management as a customers to monitor their network and single, integrated trunk performance; obtain trunk and experience involving network monitoring carrier outage notifications; create and AT&T and management, inventory track trouble tickets; view and manage Business management, ordering, billing, and inventory; and place and track orders. In troubleshooting – and not as separate 2006, the tool was expanded to include Direct® or individual tasks. This key principle every country where AT&T provides Map inspired our most innovative tool to service. Because it resides on AT&T’s delivers date, AT&T BusinessDirect® Map. award-winning business portal, secure The first of its kind in the industry, 24/7 access is assured. point-and- AT&T BusinessDirect Map is the only AT&T BusinessDirect Map is designed click map-based servicing tool to offer a to mirror the way customers do consistent, fully-integrated experience business. It first presents customers with network across multiple telecom functions and “the big picture” – their AT&T service management across multiple services. network and its overall performance. capabilities atop an interactive world map, in real-time.

6 Then, through the use of its point-and- locations; 2) via a hierarchical tree click capabilities, it allows customers to organized by sites/locations; and 3) via drill down to the underlying network inventory reports (e.g. Location Summary details from which they can check Reports, Circuit Summary Reports, APN inventory, order, react to changes in Reports, and VPN Site Lists.) their network, or report trouble. The Integration of an Other Tools The AT&T BusinessDirect Map Control feature within AT&T BusinessDirect Map Center (page 6) serves as the main lets customers seamlessly transition communication hub from the portal between inventory, ordering, and home page. It gives customers proactive maintenance tasks, eliminating the need status on all major telecom functions: to open and close multiple tools. It ordering, maintenance, and network allows data (e.g. circuit numbers) for use performance. Specifically, Status on orders and trouble tickets to be pre- Indicators change from “grayed-out” to populated directly from the inventory “highlighted” to alert customers about database. their ordering status (e.g. pending order, To learn more about the extensive jeopardy order); maintenance status (e.g. features and applications of AT&T AT&T circuit ticket, partial outage); and BusinessDirect Map, visit att.com/ebcc . Business network status (e.g. over-utilization.) AT&T BusinessDirect Map also Direct ® provides customers with their Inventory Robert Sloan Map . . . (see below) in three different ways: 1) Vice President atop a graphical world map with zoom allows AT&T eSales & Service capabilities that drill down to the street customers to names of domestic territories or to the postal/city level of international . . . check inventory, order, react to changes in their network, or report trouble.

Power becomes available only when you know exactly what you want . . . and are fully determined not to quit until you get it. – Alexander Graham Bell

7 d a t a w i t h d a v i d

Business keep traffic from private MPLS VPN customers today services separate from Internet traffic. increasingly rely on AVPN has options that appeal to IP-based technology customers of all sizes in all markets. to reduce the cost of Customers typically choose network- their network, and to based IP VPN services like AT&T VPN in provide increased the following situations: bandwidth, performance and functionality. • They need simplified meshed/semi- meshed communications. Competitive pressures have also placed a greater emphasis on network • They need a more efficient disaster protection, profitability and productivity. recovery plan for their hub site(s). AT&T VPN The AT&T Multi-Protocol Label Switching • They want to reduce complexity in (MPLS) based Virtual Private Network their network. is the (VPN) service provides all the benefits of • They are rolling out new IP evolutionary a private network—security, service level applications like Enterprise Resource agreements, manageability, scalability Planning and/or are establishing result of and reliability—at a lower cost. business-to-business extranet AT&T’s What is AT&T Virtual Private connections. strategic Network (AVPN)? • They are looking for robust features AT&T VPN is the evolutionary result of such as the ability to mix and match direction to AT&T’s strategic direction to provide port protocols and access options. provide network-based IP services. Our strategy AVPN Service Components is to create a single network-based VPN The primary AVPN service network- service with a robust set of features to components are MPLS ports. An MPLS allow customers the flexibility to choose based IP port provides the connection between a the options they require without the supported AVPN access arrangement services. need to migrate from one network VPN and the AT&T network. The MPLS port service to another. AVPN has been speed is the maximum rate for designed to include the best features transmission of data through the MPLS from our IPeFR/ATM, PNT, EVPN and port. AT&T MPLS ports are available in a NVPN services; however, it will take time variety of protocols, and the availability for AVPN to reach feature parity with all of specific port speeds will vary by of these VPNs. protocol. Currently, available port speeds AVPN is a network-based MPLS range from 56k through OC12 and we service. It enables customers to build an are developing provisions for Ethernet application aware, virtual private up to GigE. Customers have the option network to link locations and efficiently of choosing AT&T stand-alone access transmit voice, data, and video over a products or providing their own access single connection. AVPN leverages our from other sources. AT&T VPN has a highly scaled OC-192 domestic AT&T IP flexible set of access protocol options Network—also called Common Back that may be used to connect to an MPLS Bone (CBB)—the same way that port. They include ATM, Dedicated IPeFR/ATM does today. However, AVPN Private Line, Frame Relay and DSL also makes use of private provider edge (where available). Ethernet MPLS port (PE) routers. This means that they are and access options are future not used for Internet access services enhancements. and no Internet routes are contained in AT&T VPN is generally available across the routing tables. While AVPN provides the United States, including Hawaii, MPLS service to customers, we also use Puerto Rico and the U.S. Virgin Islands. this technology in our core network to

8 It is not yet available in Alaska. new site router, unlike a Layer 2 PVC International capabilities in 42 countries network, in which both the hub and are in controlled introduction. the remote site’s routers must be MPLS ports, MPLS DSL access reconfigured. This can result in CPE connections and AT&T VPN optional equipment savings of up to 50% due features are billed at fixed monthly to the need for fewer and smaller recurring charges based on the port routers at each site. speed selected and, if applicable, class Our Value Proposition of service (CoS) charges. Discount AT&T introduced the first MPLS service pricing plans are available based upon in 1998 and has continued to lead the revenue and term commitments. industry with the largest MPLS networks AVPN Addresses Customers’ in the world. AT&T VPN provides several Networking Needs major advantages: AVPN addresses a number of critical • Reliability – The backbone network is IP VPN business networking needs: designed with no single point of failure in the core architecture. • Any-to-any connectivity – AVPN enables communications between any • Network performance – The AT&T two sites (regardless of the types of network provides buffers to ensure The AVPN ports at the sites) in a specific customers with large data customer VPN, eliminating the need transmission needs do not impact the backbone for tandem routing and defined virtual performance of customers with less network is channels between sites. Growth no demanding transmission requirements. longer requires resizing and Network performance reports allow designed rebalancing of multiple Private Virtual customers to monitor and measure Circuits (PVCs). Additional sites can their network. Customers will have with no simply be added to the VPN and AT&T access to reports ordered for single point will manage IP core capacity. (See designated service components via below.) the AT&T BusinessDirect® portal. of failure in • Prioritization of traffic – AVPN • Network design support – AT&T the core provides customers a very flexible network design consultants can architecture. traffic prioritization scheme through design an optimal performing network network-based class of service (CoS). for customers using VPN networks to Customers can choose from four integrate legacy and client/server different CoS profiles to establish applications under a single network their application mix. backbone. • IP-based disaster recovery – AVPN • Security – AT&T VPN Service offers provides customers with dynamic IP the level of security that customers disaster recovery via Border Gateway have come to expect from traditional Protocol (eBGP) which allows load Frame Relay/ATM services, but also balancing across six discrete extends that security into the IP VPN Customer Edge-Provider Edge environment. MPLS provides for connections as well as supporting greater security through the creation several redundancy options for and assignment of unique Virtual carrying primary and backup routes. Network Routing and Forwarding (VRF) tables to each customer’s VPN. • Simplifies customer premise This offers the same level of privacy equipment (CPE) configuration needs as a network designed with ATM or FR – When adding an additional site, customers need only reconfigure the Continued on page 10

9 Continued from page 9 MPLS Port. PVCs, because users in a specific IP • Multicast – AT&T VPN Multicast allows VPN cannot see traffic outside their IP customers to send data from one VPN. MPLS port to multiple customer MPLS • Reduced network complexity – ports with a Multicast-enabled VPN. Network communications are Applications include corporate simplified through a reduced broadcasts, file transfers, video requirement for the complex CPE conferencing and training. routing tables that enable “fully • Diversity options – AT&T VPN supports meshed” communications. Instead of the automatic rerouting capability of the multiple IP to Data Link Control MPLS and two diversity options. The Interconnection (DLCI) addresses Service Diversity Option ensures that required for meshed PVC networks, ports are provisioned on diverse only a single IP address is required to switches/PE routers within the same route all traffic across the network. switch POP. The switch POP Diversity • Robust meshed connectivity – The option guarantees that ports are service is cost effective for customers provisioned on diverse switches in requiring even a moderate degree of diverse switch POP’s. Business meshed or any-to-any connectivity • Service Level Agreements – Some of between multiple locations. For the industry’s most aggressive SLAs customers example, a 25-site network requiring define our customers’ expected will find they fully meshed connectivity would network performance and cover on- require 300 PVCs to accomplish the time provisioning, availability/repair can save connectivity provided by 25 AVPN time, delivery rates and latency. MPLS connections. This offers money on • Built-in disaster recovery – Because considerable cost savings over it’s IP-based, networks can be kept up their traditional Frame Relay-type services. and running more simply in the event network • Eliminates the need for tandem of site or network outages. routing – Eliminating tandem routing • Investment protection – AT&T VPN is utilizing an reduces potential port congestion. our strategic network service. Future IP-based • Superior scalability – Adding new AT&T feature and option solution. locations or CPE to the customer’s enhancements will be on this network requires significantly less platform. effort than would be required in a Business customers will find they can comparable meshed Frame Relay or save money on their network utilizing an Internet Virtual Tunneling network IP-based solution. AVPN offers • IP awareness – The service allows the application awareness for traffic user to define the priority of different prioritization, scalability, and MPLS- applications and assign the based architecture. It provides appropriate class of service to each web-based tools for reporting and application at each location within supporting network and end users, and the customer’s network. Real time has industry-leading service level class of service is supported through agreements. With features to match the separate queuing in the AT&T Global unique needs of our customers’ IP network, ensuring that traffic requirements, AT&T VPN offers delivery is reliable and high economical, reliable and seamless performing. communications domestically and • Flexible access options – The variety internationally. of access arrangements available to users simplifies the addition and support of remote users, as well as allowing for access by approved Tom David external organizations. Liaison Manager [email protected] • Cost efficiencies - AT&T VPN supports Unilink as an optional feature which provides the ability to support multiple Logical Channels on a single

10 CPUC Considers Area Code Changes

Recognizing that there may soon be a code, while others will have to change shortage of available telephone numbers to the new area code. in the 714 and 760 area codes, the The alternative is an area code California Public Utilities Commission overlay. An overlay is a form of area (CPUC) plans to issue a decision later code change that adds area code(s) to this year regarding what type of area the same geographic region, so multiple code change is appropriate for the area codes co-exist within the same region. region. In this scenario, customers retain Traditionally, area codes have been their current telephone number(s) and split to provide more prefixes for the area code. Additional telephone telecommunications industry and its numbers or telecommunications services customers, creating smaller geographic may be given telephone numbers with areas. Area code splits create new area the new area code. codes by splitting a geographical region More information is available at in multiple ways. Only one area code is http://www.cpuc.ca.gov , in the assigned to a particular geographical Telecommunications Proceedings region. If this type of change is section. authorized by the CPUC, some people will be able to retain the original area

READ THE WORLD OVER

Dick Kuehn, President of RAK Consulting, catches up on important reading as the terracotta army of the first Qin emperor looks on. Xi’an, Shaanxi Province, China.

11 n a n c y g r o v e r One Laptop per Child – Bridging the Digital Divide

The One Laptop display. It boasts a camera, a per Child (OLPC) microphone capable of enabling clear project gives the video calls, 126 MB of RAM, 512 MB of world’s poorest flash memory, and a long-lasting battery children laptops of that can be charged using a cord, a car their own so they battery or foot-operated generator. And The goal is can take advantage it includes built-in WiFi with an amazing to enable of the opportunities range. computers and the A conventional wireless network only school Internet offer. The goal is to enable handles traffic within its local wireless children to school children to connect to their cloud. Each node transmits and receives classmates and teachers, even in a its own data, but packets are not routed connect to remote setting, to improve prospects between nodes unless allowed to their and ultimately lives. Since MIT’s Media communicate directly. The XO, on the Lab first unveiled the quirky looking other hand, uses an extended-range classmates laptop students receive through OLPC in chipset to form a wireless mesh and November 2005, it has gained many network. fans among computer and security teachers, geeks. So, whenever the laptop is powered on, it participates in a mobile ad-hoc even in a Brazil, Thailand, Argentina, Libya, network, with each node operating in remote Nigeria, Rwanda and Uruguay are peer-to-peer fashion with other XO participating in OLPC, and many more laptops it can “hear’ (think daisy-chain). setting, to nations are lining up. The laptop’s If just one computer in the cloud has improve manufacturer, Quanta Computer (who access to the Internet, all the computers also makes notebooks for Apple, Dell in the mesh can share that access. The prospects and HP), has received one million orders. data rate isn’t high, but it’s more than and The objective is to eventually sell 100 sufficient for classroom applications, million XO’s. web browsing and streaming video ultimately This is quite a noble undertaking to be within its own network. lives. sure. But just how do the OLPC people The XO uses a locked down plan to secure the computers? Millions operating system and a unique user of XO’s could mean millions of new interface called , which was jointly hacker targets. So just how will the folks designed by Red Hat and Pentagram. If at MIT protect them? The child who the project goes according to plan, owns the XO probably can’t run next Sugar could become one of the most door to get help from the neighborhood common platforms in the world. This of computer guru. course leads to that other problem. How They Work With so many children using the same Even though the machine looks like a type of computer, the XO could be set to toy, the XO is anything but. Its thick, become a primary target for rogue code, plastic case is dirt and moisture DOS attacks and botnets. But that’s resistant. There are no motor-driven where BitFrost comes in. parts, no hard drives, no CD/DVD or BitFrost floppy drives, no fans, and it can operate The XO does not rely on antivirus without electricity. software, firewalls, or even passwords What the XO does have is a nifty 7.5- for protection. Instead, it depends on a inch LCD screen that can switch new security model called BitFrost. between a low-resolution color and a BitFrost requires each program to run on higher-resolution black and white its own, with a limited set of permissions 12 that will not interact with other the computer eventually becomes un- programs or the operating system operational — a virtual brick. kernel. This means that a word So where can you get your very own processing program cannot access the XO? You can’t. The XO is slated to be Web, and the Internet browser cannot sold through government agencies of interact with the word processing developing countries only. Therefore, the program. So even if a hacker uses an laptop is not available to children in the exploit to gain control of the word U.S., Britain, France, or other developed processor, he will be unable to use the nations, not even for those children Internet to view, change or extract the whose families are too poor to buy a user’s documents. The OLPC team computer. And that is just one of the contrasts this with Windows XP where criticisms of the project. even the game of Solitaire has permissions to access the web, send Another issue is the money. Even “There are though the machines sell for about email, and open a picture viewer. multitudes of BitFrost would simply deny the Solitaire $100, there are other costs involved, game from doing anything other than such as teacher training, curriculum people in being a card game. development, maintenance, and Internet access. Many critics are questioning the rural or The idea of limiting application costs, saying that poor people need suburban permissions isn’t new. In fact, the food and shelter, not laptops. The OLPC concept dates all the way back to 1959. says that while this is true, “There are areas who It was never widely adopted because it multitudes of people in rural or have plenty put the burden on application writers to suburban areas who have plenty to eat incorporate security into their code. But, and reasonable accommodations. What to eat and by limiting permissions along with the these people don’t have is a decent shot reasonable secured operating system, virus and at a good education.” malware writers will have a difficult time accommoda - deploying their code onto the XO. Even Even with all the concerns, the people if something does corrupt one of the behind OLPC are continuing to do what tions. applications or the machine, BitFrost they do best — bring technology to the What these calls for a trivial reinstall of the masses and give school children in the operating system to put the machine poorest communities an opportunity to people don’t back into a fully functioning state. And it freely explore, experiment and express have is a themselves. Surely a noble cause. does this with no user interaction. decent shot BitFrost does have a drawback, For more information about the OLPC though. Because it limits interactions project, visit http://www.laptop.org/ . at a good between applications, applications must education.” work independently of each other. But according to Ivan Krstic, architect of Nancy Grover BitFrost, “This kind of model makes it Regional Manager more difficult for glue between AT&T Corporate Information applications, but 99 percent don’t need Security glue.” Theft is a real concern, especially in areas where gray markets abound. To help make sure each XO stays with its assigned child, an anti-theft system has been designed to make stolen laptops virtually useless. Each XO is assigned an encrypted “lease”, or temporary license. Each time the laptop connects to the Internet, it checks in with a country- specific server to see if the laptop has been reported stolen. If not, the lease is extended. If the laptop is stolen, or the lease expires, the XO’s Internet connectivity becomes deactivated and

13 AT&T Yellow Pages Mirrors Societal Changes

Livery stables were all the rage in the only after the Headings Product Team late 19th century, when the nation’s first determines that a critical mass of business directories started rolling off businesses is active in that industry and the press. Fast-forward to today, when that chances are strong for future animal chiropractic services, online growth. It’s tough to make the cut: schools and meal preparation Relatively few of the many proposals companies have become so popular, the that the Headings Team receives nation’s largest publisher of Yellow annually from sales people and The addition Pages directories by revenue has advertisers are ever approved. This year, of a new created new categories for them. 36 new headings were added to the The addition of a new heading is not book. (See complete list below.) heading... taken lightly at the company. It happens happens only after the AT&T Yellow Pages 2006 Heading Additions: Animal Chiropractic Immigration Services Headings Assisted Living In Home Care Meal Preparation Product Team Assisted Living Products & Services Off Road Vehicles determines Attorneys-Child Custody Law Off Road Vehicles Parts & Equip that a critical Attorneys-Motorcycle Accidents Paving Stones Concrete Contractors Attorneys-Trucking Accidents Photographers-Sports mass of Business Valuation Post Cards-Collectible businesses is Carpets & Rug Binding Pottery Instruction active in that Ceramic Equip & Supplies Whsle Project Management industry and Churches-Association of Free Lutheran Real Estate Staging Service Congregation that chances Schools Online Churches-Emerging Postmodern Stair Lifts are strong for Churches-Seven Churches of God in Surrogacy Information & Services Christ future Virtual Tours Concrete Wall Contractors growth. Water Blasting Equip & Services Dentists-Family Dentistry Water Lines Installation Replacement & Dentists-Teeth Whitening Services Repair Engineers-Retaining Walls Water Stores Retail Glass-Bullet Resistant Wheelchairs Parts & Accessories Home Improvements Disability Contractor

14 AT&T Tops Competitors in Leading Analyst’s U.S. Carrier Assessment

According to Yankee Group’s 2007 U.S. strategies, network reach and service mix. International Carrier Scorecard, AT&T According to Yankee Group’s U.S. topped a large field of International Carrier Scorecard, the recent telecommunications service providers — BellSouth merger has given AT&T the including Verizon Business, Orange potential to fully integrate wireline and Business Services, Qwest, British Telecom, wireless services on its own NTT, Global Crossing and Sprint — in a infrastructure, further advancing its “AT&T ranks study that analyzed the competitors’ competitive position. apparent capabilities vs. stated customer the highest in objectives. “AT&T ranks the highest in our overall scorecard, because it has put the our overall Yankee Group identified and measured capabilities together to deliver high-end the leading carriers relative to their professional and communications scorecard, apparent capabilities to meet enterprises’ services to large multinational because it has demands for increasingly flexible services. companies,” noted H. Paris Burstyn, The areas examined included business director of Communications and put the and services infrastructure, Service Level Converged Services, Enterprise Research, capabilities Agreement (SLA) strategies, network Yankee Group. reach, ability to deliver consistent together to “Our position in this Yankee Group services on a global basis, service mix deliver high- and migration alignment. AT&T ranked Carrier Scorecard represents a the highest overall because of its proven continuation of the industry’s validation end ability to deliver high-end professional of our business strategy,” said Mark and communications services to large Keiffer, Chief Marketing Officer, Business professional multinational companies. Services, AT&T. “We continue to work very and hard to deliver the most powerful In Yankee Group’s summary scorecard, business networks, applications and communications AT&T was the only telecommunications capabilities that drive real value for our services to provider to receive the highest rating global enterprise customers.” (“superior”) in four categories: business large and services infrastructure, SLA multinational companies.” FROM THE ARCHIVES , r e t n e C

y r o t s i H

d n a

s e v i h c r A

C B S s

f a o x

e y T s

, e t o i r n u o o t c

n o A t

o n h a P S San Diego Information Operator Showing Carousels of Listings (1930s) 15 A T & T C V S G U P D A T E A p r i l 2 0 0 7

Helpful Numbers and Web Sites

Area Code Information DSL http://areacode-info.com/ 1-877-722-3755 Area Code Look Up E-Bill http://www.my-areacode.com/ 1-888-700-5422 AT&T Account Manager (registration required) FOCUS http://www.att.com/accountmanager http://www.thefocus.org AT&T BusinessDirect® Internet Safety 1-800-221-0000 Hot Line http://sbc.com/safety http://www.att.com/businessdirect Knowledge Network AT&T Corporate Contact List http://www.kn.pacbell.com/products/discounts.html http://sbc.com/contactus Local Calling Area Mapping AT&T Customer Support http://localcalling.sbc.com/LCA/lca_input.jsp http://sbc.com/help Managed Internet Service AT&T Local Service (repair desk) 1-888-613-6330 1-800-829-1011 North American Numbering Plan AT&T Product Information Administration http://ask.sbc.com http://www.nanpa.com/ Billing Inquiry – West Priority Repair 1-800-891-1800 1-800-332-1321 California Public Utilities Commission (CPUC) Repair http://www.cpuc.ca.gov 611 Carrier Verification Up2Speed Newsletter 1-700-555-4141 – Long Distance http://sbc.com/up2speed 1-805-700-4141 – Local AT&T Consultant/Vendor Sales Group

Kari Aguinaldo, CVSG Leader Tom David, Liaison Manager 795 Folsom St Rm 517-O2 200 Center St Promenade Rm 735 San Francisco, CA 94107 Anaheim, CA 92805 415-644-7118 949-855-5055 email: [email protected] email: [email protected] Area codes: 619, 714, 760, 858, 909, 949, 951 Mike Aaron, Liaison Manager 795 Folsom St Rm 517-P3 Lowayne Shieh, Liaison Manager San Francisco, CA 94107 1150 South Olive St Rm 1600 415-644-7129 Los Angeles, CA 90015 email: [email protected] 213-743-5759 Area codes: 209, 408, 415, 510, 559, 650, 707, 831, 916, 925 email: [email protected] Area codes: 213, 310, 323, 424, 562, 626, 661, 805, 818 Eric Aguirre, Data Administrator email: [email protected] Vendor Consultant Service Center (VCSC ) Consultant/Vendor Sales Group Hot Line 1-800-773-3318 1-800-552-5299 LOA Fax 1-877-778-4141 / 4133 AT&T West Alliance Channel (registration required) https://west.alliance.att.com